Um... I'm not absolutely sure what the question is actually asking, but I believe kmfkewm covered it. Except nobody but crypto enthusiasts are gonna have a fucking clue what he just said (LOL, no offense bro, but you know it's true -- even I barely followed it and I studied the stuff once upon a time).Take this with a grain of salt, I don't understand it quite as well as he does but what he means is this: there's two keys when you encrypt a message. The key you provide is used to encrypt a second key. It's that second key that can decrypt the actual message itself (shit, it isn't the other way around right? LOL!) If the key provided is weak and short, making the message longer won't help because all that does is add extra stuff that needs to be decrypted by the second key. Getting to the second key has nothing to do with the message length.It won't help protect against the first key being cracked, and once that's cracked, it's a simple matter of just decrypting a few extra words or whatever. It offers no additional security is the take away here. A 4096 bit RSA key is considered very secure. 2048 is still secure but not really great I believe. Anything less and an adversary will be able to decrypt your message if they try hard enough and have the knowledge and resources. I'm pretty sure that's today's situation.Does that answer you...? :)